Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe
-
Size
429KB
-
MD5
3e63db9614c33b975d196059200f92c0
-
SHA1
29e7854aceb4c504efc4037e55dd9f29a6b9319f
-
SHA256
2912ad8a24e06b9477e151a477ec14da084e775b5624b2743bad1a25876e500b
-
SHA512
d678e2e35c1e6c8211bab1d8ad439ef6179798ec552fc59271f79515b343b2780a844b1905a624a799f3f768e81c981f9ca4d6d977bdddfe2cc7a7afc1141768
-
SSDEEP
12288:Iu3URWtsYf8PemjE8h0UxH9ND6fvhMrf1sA:IkQe8PemjTh0Ul/8vh+t
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2340 vuhvodg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\vuhvodg.exe 3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\zcwirze.dll vuhvodg.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vuhvodg.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2324 3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe 2340 vuhvodg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2340 2316 taskeng.exe 32 PID 2316 wrote to memory of 2340 2316 taskeng.exe 32 PID 2316 wrote to memory of 2340 2316 taskeng.exe 32 PID 2316 wrote to memory of 2340 2316 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e63db9614c33b975d196059200f92c0_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2324
-
C:\Windows\system32\taskeng.exetaskeng.exe {3DD1CB10-C41D-4CA7-8D60-152CC34838F3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\PROGRA~3\Mozilla\vuhvodg.exeC:\PROGRA~3\Mozilla\vuhvodg.exe -nwlnhvb2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD5bcce3beda0685f0fe796d26366125f0f
SHA121f4f7f38856e36a312f98fdcb30188800a549a4
SHA2568c648a4bfc75d97a89e4ce5cdf09567ca52faadd75a7894fe635ffd55de9f6cf
SHA5120f2b09630eaace5d0943c6d156cc1d1dc606fa005a55df7350fcc7dbf4563de26f53f0b019e33f64f98be020018f1554a7953d83199622a75a0da2e56de71964